Chapter 5 ZigBee/IEEE 802.15.4 Overview - PowerPoint PPT Presentation

About This Presentation
Title:

Chapter 5 ZigBee/IEEE 802.15.4 Overview

Description:

Chapter 5 ZigBee/IEEE 802.15.4 Overview Y.-C. Tseng CS/NCTU New trend of wireless technology Most Wireless industry focuses on increasing high data throughput A set ... – PowerPoint PPT presentation

Number of Views:190
Avg rating:3.0/5.0
Slides: 56
Provided by: PaulGord9
Category:

less

Transcript and Presenter's Notes

Title: Chapter 5 ZigBee/IEEE 802.15.4 Overview


1
Chapter 5ZigBee/IEEE 802.15.4 Overview
  • Y.-C. Tseng
  • CS/NCTU

2
New trend of wireless technology
  • Most Wireless industry focuses on increasing high
    data throughput
  • A set of applications require simple wireless
    connectivity, relaxed throughput, very low power,
    short distance and inexpensive hardware.
  • Industrial
  • Agricultural
  • Vehicular
  • Residential
  • Medical

3
What is ZigBee Alliance?
  • An organization with a mission to define
    reliable, cost effective, low-power, wirelessly
    networked, monitoring and control products based
    on an open global standard
  • Alliance provides interoperability, certification
    testing, and branding

4
IEEE 802.15 working group
5
Comparison between WPAN
6
ZigBee/IEEE 802.15.4 market feature
  • Low power consumption
  • Low cost
  • Low offered message throughput
  • Supports large network orders (lt 65k nodes)
  • Low to no QoS guarantees
  • Flexible protocol design suitable for many
    applications

7
ZigBee network applications
CONSUMER ELECTRONICS
monitors sensors automation control
TV VCR DVD/CD Remote control
PC PERIPHERALS
PERSONAL HEALTH CARE
ZigBee LOW DATA-RATE RADIO DEVICES
monitors diagnostics sensors
mouse keyboard joystick
HOME AUTOMATION
TOYS GAMES
security HVAC lighting closures
consolesportables educational
8
Wireless technologies
9
ZigBee/802.15.4 architecture
  • ZigBee Alliance
  • 45 companies semiconductor mfrs, IP providers,
    OEMs, etc.
  • Defining upper layers of protocol stack from
    network to application, including application
    profiles
  • First profiles published mid 2003
  • IEEE 802.15.4 Working Group
  • Defining lower layers of protocol stack MAC and
    PHY

10
How is ZigBee related to IEEE 802.15.4?
  • ZigBee takes full advantage of a powerful
    physical radio specified by IEEE 802.15.4
  • ZigBee adds logical network, security and
    application software
  • ZigBee continues to work closely with the IEEE to
    ensure an integrated and complete solution for
    the market

11
IEEE 802.15.4 overview
12
General characteristics
  • Data rates of 250 kbps , 20 kbps and 40kpbs.
  • Star or Peer-to-Peer operation.
  • Support for low latency devices.
  • CSMA-CA channel access.
  • Dynamic device addressing.
  • Fully handshaked protocol for transfer
    reliability.
  • Low power consumption.
  • Channels
  • 16 channels in the 2.4GHz ISM band,
  • 10 channels in the 915MHz ISM band
  • 1 channel in the European 868MHz band.
  • Extremely low duty-cycle (lt0.1)

13
IEEE 802.15.4 basics
  • 802.15.4 is a simple packet data protocol for
    lightweight wireless networks
  • Channel Access is via Carrier Sense Multiple
    Access with collision avoidance and optional time
    slotting
  • Message acknowledgement
  • Optional beacon structure
  • Target applications
  • Long battery life, selectable latency for
    controllers, sensors, remote monitoring and
    portable electronics
  • Configured for maximum battery life, has the
    potential to last as long as the shelf life of
    most batteries

14
IEEE 802.15.4 Device Types
  • There are two different device types
  • A full function device (FFD)
  • A reduced function device (RFD)
  • The FFD can operate in three modes by serving as
  • Device
  • Coordinator
  • PAN coordinator
  • The RFD can only serve as
  • Device

15
FFD vs RFD
  • Full function device (FFD)
  • Any topology
  • Network coordinator capable
  • Talks to any other device
  • Reduced function device (RFD)
  • Limited to star topology
  • Cannot become a network coordinator
  • Talks only to a network coordinator
  • Very simple implementation

16
Star topology
Network
Network
coordinator
coordinator
Master/slave
Full Function Device (FFD)
Reduced Function Device (RFD)
Communications Flow
17
Peer to peer topology
Point to point
Tree
Full Function Device (FFD)
Communications Flow
18
Device addressing
  • Two or more devices communicating on the same
    physical channel constitute a WPAN.
  • A WPAN includes at least one FFD (PAN
    coordinator)
  • Each independent PAN will select a unique PAN
    identifier
  • Each device operating on a network has a unique
    64-bit extended address. This address can be used
    for direct communication in the PAN
  • A device also has a 16-bit short address, which
    is allocated by the PAN coordinator when the
    device associates with its coordinator.

19
IEEE 802.15.4 physical layer
20
IEEE 802.15.4 PHY overview
  • PHY functionalities
  • Activation and deactivation of the radio
    transceiver
  • Energy detection within the current channel
  • Link quality indication for received packets
  • Clear channel assessment for CSMA-CA
  • Channel frequency selection
  • Data transmission and reception

21
IEEE 802.15.4 PHY Overview
  • Operating frequency bands

22
Frequency Bands and Data Rates
  • The standard specifies two PHYs
  • 868 MHz/915 MHz direct sequence spread spectrum
    (DSSS) PHY (11 channels)
  • 1 channel (20Kb/s) in European 868MHz band
  • 10 channels (40Kb/s) in 915 (902-928)MHz ISM band
  • 2450 MHz direct sequence spread spectrum (DSSS)
    PHY (16 channels)
  • 16 channels (250Kb/s) in 2.4GHz band

23
PHY Frame Structure
  • PHY packet fields
  • Preamble (32 bits) synchronization
  • Start of packet delimiter (8 bits) shall be
    formatted as 11100101
  • PHY header (8 bits) PSDU length
  • PSDU (0 to 127 bytes) data field

PHY Header
Sync Header
PHY Payload
Start of Packet Delimiter
Frame Length (7 bit)
PHY Service Data Unit (PSDU)
Reserve (1 bit)
Preamble
4 Octets
1 Octets
1 Octets
0-127 Bytes
24
IEEE 802.15.4 MAC
25
Superframe
  • A superframe is divided into two parts
  • Inactive all station sleep
  • Active
  • Active period will be divided into 16 slots
  • 16 slots can further divided into two parts
  • Contention access period
  • Contention free period

26
Superframe
  • Beacons are used for
  • starting superframes
  • synchronizing with other devices
  • announcing the existence of a PAN
  • informing pending data in coordinators
  • In a beacon-enabled network,
  • Devices use the slotted CSMA/CA mechanism to
    contend for the usage of channels
  • FFDs which require fixed rates of transmissions
    can ask for guarantee time slots (GTS) from the
    coordinator

27
Superframe
  • The structure of superframes is controlled by two
    parameters
  • beacon order (BO) decides the length of a
    superframe
  • superframe order (SO) decides the length of the
    active potion in a superframe
  • For a beacon-enabled network, the setting of BO
    and SO should satisfy the relationship 0?SO?BO?14
  • For channels 11 to 26, the length of a superframe
    can range from 15.36 msec to 215.7 sec ( 3.5
    min).

28
Superframe
  • Each device will be active for 2-(BO-SO) portion
    of the time, and sleep for 1-2-(BO-SO) portion of
    the time
  • Duty Cycle

BO-SO 0 1 2 3 4 5 6 7 8 9 ?10
Duty cycle () 100 50 25 12 6.25 3.125 1.56 0.78 0.39 0.195 lt 0.1
29
Data Transfer Model (I)
  • Data transferred from device to coordinator
  • In a beacon-enable network, a device finds the
    beacon to synchronize to the superframe
    structure. Then it uses slotted CSMA/CA to
    transmit its data.
  • In a non-beacon-enable network, device simply
    transmits its data using unslotted CSMA/CA

Communication to a coordinator In a non
beacon-enabled network
Communication to a coordinator In a
beacon-enabled network
30
Data Transfer Model (II-1)
  • Data transferred from coordinator to device in a
    beacon-enabled network
  • The coordinator indicates in the beacon that some
    data is pending.
  • A device periodically listens to the beacon and
    transmits a Data Requst command using slotted
    CSMA/CA.
  • Then ACK, Data, and ACK follow

Communication from a coordinator In a
beacon-enabled network
31
Data transfer model (II-2)
  • Data transferred from coordinator to device in a
    non-beacon-enable network
  • The device transmits a Data Request using
    unslotted CSMA/CA.
  • If the coordinator has its pending data, an ACK
    is replied.
  • Then the coordinator transmits Data using
    unslotted CSMA/CA.
  • If there is no pending data, a data frame with
    zero length payload is transmitted.

Communication from a coordinator in a non
beacon-enabled network
32
Channel Access Mechanism
  • Two type channel access mechanism
  • beacon-enabled networks ? slotted CSMA/CA channel
    access mechanism
  • non-beacon-enabled networks ? unslotted CSMA/CA
    channel access mechanism

33
Slotted CSMA/CA algorithm
  • In slotted CSMA/CA
  • The backoff period boundaries of every device in
    the PAN shall be aligned with the superframe slot
    boundaries of the PAN coordinator
  • i.e. the start of first backoff period of each
    device is aligned with the start of the beacon
    transmission
  • The MAC sublayer shall ensure that the PHY layer
    commences all of its transmissions on the
    boundary of a backoff period

34
Slotted CSMA/CA algorithm (cont.)
  • Each device maintains 3 variables for each
    transmission attempt
  • NB number of times that backoff has been taken
    in this attempt (if exceeding macMaxCSMABackoff,
    the attempt fails)
  • BE the backoff exponent which is determined by
    NB
  • CW contention window length, the number of clear
    slots that must be seen after each backoff
  • always set to 2 and count down to 0 if the
    channel is sensed to be clear
  • The design is for some PHY parameters, which
    require 2 CCA for efficient channel usage.
  • Battery Life Extension
  • designed for very low-power operation, where a
    node only contends in the first 6 slots

35
Slotted CSMA/CA (cont.)
need 2 CCA to ensure no collision
36
Why 2 CCAs to Ensure Collision-Free
  • Each CCA occurs at the boundary of a backoff slot
    ( 20 symbols), and each CCA time 8 symbols.
  • The standard species that a transmitter node
    performs the CCA twice in order to protect
    acknowledgment (ACK).
  • When an ACK packet is expected, the receiver
    shall send it after a tACK time on the backoff
    boundary
  • tACK varies from 12 to 31 symbols
  • One-time CCA of a transmitter may potentially
    cause a collision between a newly-transmitted
    packet and an ACK packet.
  • (See examples below)

37
Why 2 CCAs (case 1)
Backoff boundary
Existing session
New transmitter
CCA
Detect an ACK
Backoff end here
New transmitter
CCA
CCA
Detect an ACK
Backoff end here
38
Why 2 CCAs (Case 2)
Backoff boundary
Existing session
New transmitter
CCA
Detect an ACK
Backoff end here
New transmitter
CCA
Detect an DATA
Backoff end here
39
Why 2 CCAs (Case 3)
Backoff boundary
Existing session
New transmitter
CCA
CCA
Detect an ACK
Backoff end here
New transmitter
CCA
Detect a DATA
Backoff end here
40
Unslotted CSMA/CA
only one CCA
41
GTS Concepts (I)
  • A guaranteed time slot (GTS) allows a device to
    operate on the channel within a portion of the
    superframe
  • A GTS shall only be allocated by the PAN
    coordinator
  • The PAN coordinator can allocated up to 7 GTSs at
    the same time
  • The PAN coordinator decides whether to allocate
    GTS based on
  • Requirements of the GTS request
  • The current available capacity in the superframe

42
GTS Concepts (II)
  • A GTS can be deallocated
  • At any time at the discretion of the PAN
    coordinator or
  • By the device that originally requested the GTS
  • A device that has been allocated a GTS may also
    operate in the CAP
  • A data frame transmitted in an allocated GTS
    shall use only short addressing

43
GTS Concepts (III)
  • Before GTS starts, the GTS direction shall be
    specified as either transmit or receive
  • Each device may request one transmit GTS and/or
    one receive GTS
  • A device shall only attempt to allocate and use a
    GTS if it is currently tracking the beacon
  • If a device loses synchronization with the PAN
    coordinator, all its GTS allocations shall be
    lost
  • The use of GTSs be an RFD is optional

44
Association Procedures (1/2)
  • A device becomes a member of a PAN by associating
    with its coordinator
  • Procedures

45
Association Procedures (2/2)
  • In IEEE 802.15.4, association results are
    announced in an indirect fashion.
  • A coordinator responds to association requests by
    appending devices long addresses in beacon
    frames
  • Devices need to send a data request to the
    coordinator to acquire the association result
  • After associating to a coordinator, a device will
    be assigned a 16-bit short address.

46
ZigBee Network Layer Protocols
47
ZigBee Network Layer Overview
  • Three kinds of networks are supported star,
    tree, and mesh networks

48
ZigBee Network Layer Overview
  • Three kinds of devices in the network layer
  • ZigBee coordinator responsible for initializing,
    maintaining, and controlling the network
  • ZigBee router form the network backbone
  • ZigBee end device must be connected to
    router/coordinator
  • In a tree network, the coordinator and routers
    can announce beacons.
  • In a mesh network, there is no regular beacon.
  • Devices in a mesh network can only communicate
    with each other in a peer-to-peer manner

49
Address Assignment
  • In ZigBee, network addresses are assigned to
    devices by a distributed address assignment
    scheme
  • ZigBee coordinator determines three network
    parameters
  • the maximum number of children (Cm) of a ZigBee
    router
  • the maximum number of child routers (Rm) of a
    parent node
  • the depth of the network (Lm)
  • A parent device utilizes Cm, Rm, and Lm to
    compute a parameter called Cskip
  • which is used to compute the size of its
    childrens address pools

50
Cskip31
Total127
0
1
32
63
94
For node C
125
,126
  • If a parent node at depth d has an address
    Aparent,
  • the nth child router is assigned to address
    Aparent(n-1)Cskip(d)1
  • nth child end device is assigned to address
    AparentRmCskip(d)n

C
51
ZigBee Routing Protocols
  • In a tree network
  • Utilize the address assignment to obtain the
    routing paths
  • In a mesh network
  • Routing Capability ZigBee coordinators and
    routers are said to have routing capacity if they
    have routing table capacities and route discovery
    table capacities
  • There are 2 options
  • Reactive routing if having routing capacity
  • Tree routing if having no routing capacity

52
ZigBee Tree Routing
  • When a device receives a packet, it first checks
    if it is the destination or one of its child end
    devices is the destination
  • If so, accept the packet or forward it to a child
  • Otherwise, relay it along the tree
  • Example
  • 38 ? 45
  • 38 ? 92

53
ZigBee Mesh Routing
  • Route discovery by AODV-like routing protocol
  • The cost of a link is defined based on the packet
    delivery probability on that link
  • Route discovery procedure
  • The source broadcasts a route request packet
  • Intermediate nodes will rebroadcast route request
    if
  • They have routing discovery table capacities
  • The cost is lower
  • Otherwise, nodes will relay the request along the
    tree
  • The destination will choose the routing path with
    the lowest cost and then send a route reply

54
Routing in a Mesh network Example
55
Summary of ZigBee network layer
Pros Cons
Star 1. Easy to synchronize 2. Support low power operation 3. Low latency 1. Small scale
Tree 1. Low routing cost 2. Can form superframes to support sleep mode 3. Allow multihop communication 1. Route reconstruction is costly 2. Latency may be quite long
Mesh 1. Robust multihop communication 2. Network is more flexible 3. Lower latency 1. Cannot form superframes (and thus cannot support sleep mode) 2. Route discovery is costly 3. Needs storage for routing table
Write a Comment
User Comments (0)
About PowerShow.com